Date First Published: 2nd May 2022
Topic: Computer Networking
Subtopic: Data Transmission Technologies
Article Type: Computer Terms & Definitions
Difficulty: MediumDifficulty Level: 4/10
Learn more about what piggybacking is in this article.
In wireless communications, piggybacking, also known as Wi-Fi squatting, refers to the unauthorised use of someone else’s wireless network. Piggybacking most often occurs in unsecured wireless networks with no security standards, although it can also occur in a secured wireless network if the password has been discovered or if a computer has been left unlocked when not in use.
The most common purpose of piggybacking is to obtain free network access when a monthly subscription cannot be afforded to an internet service provider or when a user is outside of their network span rather than for malicious purposes, such as spreading viruses or engaging in data theft. A user who engages in piggybacking is referred to as a piggybacker.
Piggybacking has a number of effects. It can slow down the network connection for authorised users and consume much more bandwidth without the owner being aware of the reason for the reduction in speed and increased use of bandwidth.
Piggybacking can be detected by logging into the administration page of a router, which will list all the devices that are connected to the network. If unrecognised devices are listed, that is an immediate sign of unauthorised use of that wireless network.
An example of piggybacking would be someone searching on their device for a wireless network, finding an unsecured network that is owned by someone in their neighbourhood, and then using it without their permission. For shops and airports that provide users with free Wi-Fi, searching on a device for their free, unsecured wireless network and then using it is not considered piggybacking as that airport or shop has given permission for their wireless network to be used. However, non-customers or people outside the premises may be piggybacking if they haven't given permission for them to use it.
Piggybacking can be prevented by the following methods:
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection